India Internet Engineering Society (IIESoc) & Industry Network Technology Council (INTC) will be organizing the 6th iteration of Connections as a joint fully online event on Feb 5-8 2024.
Post Quantum Security track with talks from Bas Westerban and Tirumaleswar Reddy.
Dawn of the Post Quantum Internet
We are at a pivotal moment in cybersecurity. Browsers are rolling out post-quantum encryption by default to counter the store-now-decrypt-later threat. What once was the subject of futuristic tech demos, will soon become the baseline expectation for security. Encryption is only half the story. Post-quantum certificates are much more challenging to deploy. In this talk, we will take measure of the current state, and the challenges that lay ahead for the public Web and its PKI.
PQC for Engineers
I will talk about the “Post-Quantum Cryptography for Engineers” draftthat is adopted in the PQUIP WG. This document explains why engineers need to be aware of and understand post-quantum cryptography. It emphasizes the potential impact of Cryptographically Relevant Quantum Computers on current cryptographic systems and the need to transition to post-quantum algorithms to ensure long-term security.
Several widely-deployed messaging applications have developed their own protocols. While these protocols are similar, no two are close enough to interoperate. As a result, each application vendor has had to maintain their own protocol stack and independently build trust in the quality of the protocol. The goal of the
working group is to develop a standard messaging security protocol for human-to-human(s) communication with the above security and deployment properties so that applications can share code, and so that there can be shared validation of the protocol (as there has been with TLS 1.3).
TLS 1.3, the latest version of the Transport Layer Security protocol, brings forth significant advancements and improvements over its predecessors. In this discussion, we will delve into some of the key changes introduced by TLS 1.3, namely the increased encryption in the handshake process, deprecation of specific key exchange algorithms, and the introduction of new extensions. Additionally, we will explore the implications of TLS 1.3 on network management within enterprises.
Nalini started her career doing network design and monitoring for the Chevron network. She specializes in network performance analysis, measurement, monitoring, tuning, and troubleshooting of large enterprise networks.
One of her specialties is training and network design for IPv6 migration for large enterprises. Many of the Fortune 1000 level companies as well as the large US government organizations have taken her classes on various networking topics.
She has developed network monitoring and diagnostic products which IBM and other software companies later marketed. She received the A.A. Michelson award from the Computer Measurement Group for her contributions to the field. Nalini is on the Advisory Board of the India Internet Engineering Society (IIESoc).
In this one-hour webinar, we will delve into the world of Transport Layer Security (TLS) and focus on one of its fundamental components, the handshake. TLS is a cryptographic protocol widely used to secure communication over computer networks. By analyzing packet traces, we will demystify the TLS handshake process, step by step, and gain a comprehensive understanding of how it establishes secure connections.
- The importance of TLS and secure communication
- Overview of the TLS protocol
- Explanation of its role in securing network communications
- Discussion on the importance of the handshake process
- A step-by-step breakdown of the TLS handshake process
- Highlighting key TLS handshake message types and their significance
Nalini Elkins is the President of the Industry Network Technology Council. She is also the CEO and Founder of Inside Products, Inc. Nalini is a recognized leader in the field of computer performance measurement and analysis. In addition to being an experienced software product designer, developer, and planner, she has been the founder or co-founder of four start-ups in the high-tech arena.
Nalini started her career doing network design and monitoring for the Chevron network. She specializes in network performance analysis, measurement, monitoring, tuning, and troubleshooting of large enterprise networks.
One of her specialties is training and network design for IPv6 migration for large enterprises. Many of the Fortune 1000 level companies as well as the large US government organizations have taken her classes on various networking topics.
She has developed network monitoring and diagnostic products which were later marketed by IBM and other software companies. She received the A.A. Michelson award from the Computer Measurement Group for her contributions to the field. Nalini is on the Advisory Board of the India Internet Engineering Society (IIESoc).
This webinar is a part of the Cryptography webinar series.
The goal for the second security session is to understand some of the terms which are crucial to cryptography. The explanation will be for those implementing security protocols rather than academics or cryptographers. We will cover:
-
DES
-
3DES
-
Asymmetric encryption / symmetric encryption
-
Elliptic curve cryptography
-
Certificate authorities
-
Diffie-Hellman key exchange
-
Diffie-Hellman groups
-
Hashed message authentication code (HMAC)
-
Message authentication code (MAC)
-
Message digest algorithm 5 (MD5)
-
Rivest Shamir Adleman (RSA)
-
Secure hash algorithm (SHA)
-
X.500 distinguished name
-
X.509 digital certificates
Nalini Elkins is the President of the Industry Network Technology Council. She is also the CEO and Founder of Inside Products, Inc. Nalini is a recognized leader in the field of computer performance measurement and analysis. In addition to being an experienced software product designer, developer, and planner, she has been the founder or co-founder of four start-ups in the high-tech arena.
Nalini started her career doing network design and monitoring for the Chevron network. She specializes in network performance analysis, measurement, monitoring, tuning, and troubleshooting of large enterprise networks.
One of her specialties is training and network design for IPv6 migration for large enterprises. Many of the Fortune 1000 level companies as well as the large US government organizations have taken her classes on various networking topics.
She has developed network monitoring and diagnostic products which were later marketed by IBM and other software companies. She received the A.A. Michelson award from the Computer Measurement Group for her contributions to the field. Nalini is on the Advisory Board of the India Internet Engineering Society (IIESoc).
The goal for the first security session is to understand some of the terms which are crucial to cryptography. The explanation will be for those implementing security protocols rather than academics or cryptographers. We will cover:
-
DES
-
3DES
-
Asymmetric encryption / symmetric encryption
-
Elliptic curve cryptography
-
Certificate authorities
-
Diffie-Hellman key exchange
-
Diffie-Hellman groups
-
Hashed message authentication code (HMAC)
-
Message authentication code (MAC)
-
Message digest algorithm 5 (MD5)
-
Rivest Shamir Adleman (RSA)
-
Secure hash algorithm (SHA)
-
X.500 distinguished name
-
X.509 digital certificates
Nalini Elkins is the President of the Industry Network Technology Council. She is also the CEO and Founder of Inside Products, Inc. Nalini is a recognized leader in the field of computer performance measurement and analysis. In addition to being an experienced software product designer, developer, and planner, she has been the founder or co-founder of four start-ups in the high-tech arena.
Nalini started her career doing network design and monitoring for the Chevron network. She specializes in network performance analysis, measurement, monitoring, tuning, and troubleshooting of large enterprise networks.
One of her specialties is training and network design for IPv6 migration for large enterprises. Many of the Fortune 1000 level companies as well as the large US government organizations have taken her classes on various networking topics.
She has developed network monitoring and diagnostic products which were later marketed by IBM and other software companies. She received the A.A. Michelson award from the Computer Measurement Group for her contributions to the field. Nalini is on the Advisory Board of the India Internet Engineering Society (IIESoc).
From: Thursday, 23rd February 2023 to Thursday, 12th October 2023
Session Topics for Security webinars:
- Fundamentals of Cryptography: February 23, 11am Eastern, 9:30pm India
- Fundamentals of Cryptography: April 20, 11am Eastern, 8:30pm India
- Fundamentals of Cryptography: May 18, 11am Eastern, 8:30pm India
- How does TLS work? (up to 1.3): June 15, 11am Eastern, 8:30pm India
- How does TLS1.3 work?: August 10, 11am Eastern, 8:30pm India
- Introduction to MLS: September 14, 11am Eastern, 8:30pm India
- MLS in Depth: October 12, 11am Eastern, 8:30pm India
Connections is being held April 2-8, 2022, shortly after the IETF 113 meeting. It is a fully online event created jointly by IIESoc & INTC. The first day will include the following keynote presentations:
- IPv6 — past, present & future by Bob Hinden
- Going Dark — catastrophic security and privacy losses due to loss of visibility by managed private network operators by Dr. Paul Vixie
- TBD by Ron Bonica
This session discusses the ways enterprises might want to think about migration to IPv6. Some vulnerabilities may be the same as IPv4 while other will be different. Vulnerabilities may be introduced by additional complexity, for example, transition mechanisms or dual-stacking.When many enterprises think about security, a number of areas are involved. These include:
- Audits/Compliance
- Threat detection
- Risk analysis
- Root cause determination
- Encryption
- Privacy
- Confidentiality
- Penetration testing
Presented by Nalini Elkins.